Specops Software Blog

reports with lock on top

Aligning password policies with cybersecurity KPIs 

As an IT pro, you’re tasked with measuring (and ultimately proving) the value of your cybersecurity investments. But how do you show that your security efforts and expenditures have the desired effect? One way is by aligning your cybersecurity... Read More

Illustration of password reuse. Person holding cell phone in front of open laptop with transparent security icons floating around

Password reuse: A hidden danger you can’t ignore

Reusing passwords is common, despite years of warnings to end users. It’s a problem that’s difficult for IT teams to get a handle on, especially if people are reusing work passwords at home. This means a breach elsewhere can... Read More